Novel methodologies to detect covert databases

Keun Gi Lee, Joon Ho Choi, Soo Kyung Lim, Seokhee Lee, Sangjin Lee

Research output: Contribution to journalArticle

5 Citations (Scopus)

Abstract

Abs Companies have substituted paper based systems with IT systems, such as DBMS (Database Management System), EDMS (Electronic Document Management System), and ERP (Enterprise Resource Planning) system. We should focus our attention on discovering sensitive information, in a database server, since the majority of corporations use DBMS. However, concealment is difficult to observe and detect, because perpetrators do their best to hide their illegal activities. In particular, we need to consider the case of a covert database server. This paper proposes methodologies to detect covert database servers that would be helpful to forensic investigators. Therefore, we describe an example of a covert database server and suggest several detection, techniques. Finally, we provide an investigation scenario that applies our methodology in the real world.

Original languageEnglish
Pages (from-to)1313-1324
Number of pages12
JournalInternational Journal of Innovative Computing, Information and Control
Volume6
Issue number3
Publication statusPublished - 2010 Mar

Keywords

  • Database
  • Digital forensic
  • Hiding
  • Network searching

ASJC Scopus subject areas

  • Software
  • Theoretical Computer Science
  • Information Systems
  • Computational Theory and Mathematics

Fingerprint Dive into the research topics of 'Novel methodologies to detect covert databases'. Together they form a unique fingerprint.

  • Cite this